FISMA

[et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”0px|0px|2px|0px” fullwidth=”on” _builder_version=”3.0.47″][et_pb_fullwidth_header title=”Federal Information Security Management Act (FISMA)” background_layout=”dark” text_orientation=”center” header_scroll_down=”on” scroll_down_icon=”%%3%%” button_one_url=”http://www.mdsny.com/contact/” background_overlay_color=”rgba(0,0,0,0.39)” _builder_version=”3.0.59″ title_font_size=”63px” content_font_size=”26px” subhead_font=”Droid Sans||||” subhead_font_size=”31px” background_color=”#2d3743″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/07/dreamstime_xl_73411499.jpg” background_blend=”overlay” background_url=”http://www.mdsny.com/wp-content/uploads/2017/06/healthcare-system-asseses-converged-infrastructure-to-increase-efficiency-save-costs-2.jpg” /][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”54px|0px|9px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” custom_padding=”0px|0px|0px|0px” background_color=”#ffffff” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.47″ text_line_height=”1.5em” header_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Ensure governmental informatin, operations and assets are protected against natural or man-made threats.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text text_orientation=”center” _builder_version=”3.0.47″ text_font=”||||” text_font_size=”58px” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

 Does being compliant to FISMA matter for my organization?

[/et_pb_text][et_pb_button button_url=”http://www.mdsny.com/contact/” button_text=”Find Out Now” button_alignment=”center” _builder_version=”3.0.47″ custom_button=”on” button_text_size=”27px” button_text_color=”rgba(0,0,0,0.95)” button_border_width=”2px” button_border_color=”#0c000c” button_border_radius=”1px” button_text_color_hover=”#ffffff” button_bg_color_hover=”#3dacb6″ background_color=”#7EBEC5″ /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”10px|0px|13px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”27px|0px|12px|0px” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”21px” text_text_color=”#2b2b2b” text_line_height=”1.8em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

The Federal Information Security Management Act (FISMA) assigns responsibilities to various agencies to ensure the security of data within the federal government and affiliated parties (such as government contractors) by mandating information security controls and periodic audits.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” background_color=”#e6eaea” custom_padding=”40px|0px|0px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”0px|0px|1px|0px” background_color=”#e6eaea” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”20px” text_text_color=”#2b2b2b” text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

What to know about the Role of NIST in FISMA Compliance:
The National Institute of Standards and Technology (NIST) is chartered with developing and issuing standards, guidelines and other publications which federal agencies must follow to implement FISMA and manage cost-effective programs to protect their information and information systems.
NIST standards and guidelines are arranged as follows:

  • Federal Information Processing Standards (FIPS)
  • Guidance documents and recommendations (issued in the NIST Special Publication (SP) 800 series
  • Other security-related publications, including interagrency and internal reports (NISTIRs)

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”0px|0px|1px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”27px|0px|0px|0px” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”21px” text_text_color=”#2b2b2b” text_line_height=”1.4em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

What You Need to Do – and How MDS Can Help:

NIST has created a set of standards and guides which create a Risk Management Framework for agencies to manage organizational risk in accordance with FISMA requirements. This framewokr sets forth an approach to security control selection and specification with consideration to effectiveness, efficiency, and constraints. Federal agencies must undersake the following steps to maintain an effective security program:

 

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” custom_padding=”0px|0px|27px|0px” _builder_version=”3.0.59″][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.59″ text_font=”Droid Sans||||” text_text_color=”#000000″]

  • Step One: Define critically/sensitivity of information system according to potential impact of loss
  • Step Two: Select baseline (minimum) security controls to protect the information system; apply tailoring guidance as appropriate
  • Step Three: Use risk assessment results results to suppliment the tailored security control baseline as needed to ensure adequate security and due diligence
  • Step Four: Document the security plan, the security requirements for the informaiton system and the security controls planned or in place
  • Step Five: Implement security controls; apply security configuration settings
  • Step Six: Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements)
  • Step Seven: Determine risk to agency operations, agency assets, or individuals and, if acceptable, authorize information system operation
  • Step Eight: Continuously track changes to the information system that may affect security controls and reassess control effectiveness 

 

Key Takeaways:

With 75% of new attacks against software and 90% of all vulnerabilities in software, NIST and FISMA recognize that federal agencies must place a strong emphasis on application security. Federal agencies wish to improve their overall security along with their FISMA Gade should prepare for the new threats targeted at their applications and prepare themselves well in advance for more stringent requirements by evaluating their software using third-party application security providers such as MDS.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” background_color=”#e6eaea” custom_padding=”24px|0px|0px|0px” _builder_version=”3.0.63″][et_pb_row admin_label=”row” custom_padding=”15px|0px|28px|0px” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_cta title=”Which Regulations Matter to You? ” button_url=”http://www.mdsny.com/contact/” button_text=”Learn More” use_background_color=”off” background_layout=”light” _builder_version=”3.0.47″ header_font=”Droid Sans|on|||” header_font_size=”30px” body_font=”Droid Sans||||” body_font_size=”19px” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

The certified professionals at MDS will help you determine which regulations your organization needs to meet.

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”Blurb” background_color=”#2d3743″ inner_shadow=”on” custom_padding=”40px|0px|0px|0px” make_fullwidth=”on” _builder_version=”3.0.63″ global_module=”118956″][et_pb_row admin_label=”row” global_parent=”118956″ make_fullwidth=”on” custom_padding=”0px|0px|17px|0px” background_color=”#2d3743″ background_position_1=”top_left” background_position_2=”top_left” background_position_3=”top_left” background_repeat_1=”no-repeat” background_repeat_2=”no-repeat” background_repeat_3=”no-repeat” _builder_version=”3.0.63″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_image=”https://www.mdsny.com/wp-content/uploads/2017/06/money-euro-coins-currency-332304-2.jpeg”][et_pb_column type=”1_2″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font=”Droid Sans||||” header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dfdfdf” background_size=”initial” background_position=”top_left” background_repeat=”repeat” inline_fonts=”Droid Sans”]

Our Pledge:

Building out and maintaining your IT ecosystem doesn’t have to be a do-it-yourself project. MDS can help identify network issues, configure devices, and optimize your infrastructure to maximize efficiency and performance. Our consultants are highly trained technology specialists that understand the complexities of multi-vendor environments and have the knowledge and skills to help your business become more agile, customer-focused and operationally efficient.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dbdbdb” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Upcoming Events:

Ransomware is on the rise: let’s talk about how to stay safe over some wine!

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dfdfdf” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Contacts: |

NYC Headquarters:
307 West 38th Street, Suite 1801
New York, NY 10018
Tel: 646-744-1000

Miami Office:
Tel: 786-899-2980
San Juan Office: Tel: 646-460-6229

Email
: contactus@mdsny.com

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section]